簡 歷:
? 王喆,計算機系統(tǒng)結(jié)構(gòu)專業(yè)博士。主要研究方向是計算機系統(tǒng)安全,包括體系結(jié)構(gòu)安全、系統(tǒng)虛擬化安全、操作系統(tǒng)安全、軟硬件漏洞挖掘與利用等?,F(xiàn)階段主要的研究興趣是系統(tǒng)安全與程序分析、編譯、操作系統(tǒng)、虛擬化和體系結(jié)構(gòu)的交叉研究。主持1項國家自然科學基金青年基金,同時作為骨干人員,承擔多項國家863計劃、國家自然科學基金重點項目、北京市科委重大專項、國防裝備研發(fā)計劃。近年來在計算機安全、軟件工程和操作系統(tǒng)等領域的頂級國際會議和期刊上發(fā)表CCF-A類論文10余篇,包括IEEE Security & Privacy(Oakland)、USENIX Security、USENIX ATC、ACM CCS、ACM ISSTA、IEEE TCAD、IEEE TDSC、IEEE TSE等。曾獲2021年度國科大“領雁”金獎、2020年度計算所“卓越之星”等獎項和稱號。??
? 2021年10月 — 今:中科院計算所,副研究員??
? 2018年07月 —?2021年09月:中科院計算所,助理研究員??
? 2012年09月 —?2018年06月:中科院計算所,博士??
? 2008年09月 —?2012年06月:北京工業(yè)大學,本科?
主要論著:
論文:?
[1]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, and Zhe Wang (通信). SpecWands: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. Published in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD’23). CCF-A?
[2]Peihua Zhang, Chenggang Wu, Mingfan Peng, Kai Zeng, Ding Yu, Yuanming Lai, Wei Wang, Zhe Wang: Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques. In Proceedings of the 21st IEEE/ACM International Symposium on Code Generation and Optimization (CGO’23). CCF-B?
[3]Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, and Zhe Wang (通信): CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. In Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS'22). CCF-A?
[4]Chenggang Wu, Mengyao Xie, Zhe Wang (通信), Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, and Min Yang: Dancing with Wolves: An Intra-process Isolation with Privileged Hardware. Published in IEEE Transactions on Dependable and Secure Computing (TDSC 2022). CCF-A?
[5]Bowen Tang, Chenggang Wu, Zhe Wang (通信), Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu: SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. Published in IEEE Transactions on Dependable and Secure Computing (TDSC 2022). CCF-A?
[6]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Nepal Surya, Yansong Gao, Kang Li, Zhe Wang, and Chenggang Wu: SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh. In Proceedings of the 2022 USENIX Annual Technical Conference (ATC'22). CCF-A?
[7]Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah: SLIME: Program-sensitive Energy Allocation for Fuzzing. In Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'22). CCF-A?
[8]Shunfan Zhou, Zhemin Yang, Qiao Dan, Jie Xiang, Peng Liu, Min Yang, Zhe Wang, and Chenggang Wu: Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. In Proceedings of the 31st USENIX Security Symposium (Security’22). CCF-A?
[9]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi: Making Information Hiding Effective Again. Published in IEEE Transactions on Dependable and Secure Computing (TDSC 2021). CCF-A?
[10]Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, and Min Yang: SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. In Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland’20). CCF-A?
[11]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi: SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. In Proceedings of the 28th USENIX Security Symposium (Security’19). CCF-A?
[12]Zhe Wang, Chenggang Wu, Xiang Yuan, Zhenjiang Wang, Jianjun, Li, Pen-Chung Yew, Jeff Huang, Xiaobing Feng, Yanyan Lan, Yunji Chen, Yuanming Lai, and Yong Guan. Using Local Clocks to Reproduce Concurrency Bugs. Published in IEEE Transactions on Software Engineering (TSE 2017). CCF-A?
[13]Zhe Wang, Chenggang Wu, Jianjun Li, Yuanming Lai, Xiangyu Zhang, Wei-Chung Hsu, and Yueqiang Cheng: ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks. In Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environment (VEE’17). CCF-B?
[14]Zhe Wang, Jianjun Li, Chenggang Wu, Dongyan Yang, Zhenjiang Wang, Wei-Chung Hsu, Bin Li, and Yong Guan. HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines. In Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE’15). CCF-B?
??
專利:?
[1]王喆,武成崗,王振江,李建軍:一種抵御代碼重用攻擊的方法? CN201510501698.X已授權(quán)?
[2]王喆,武成崗,賴遠明,康妍:一種容器虛擬化安全加固裝置及方法 CN201910188731.6已受理?
[3]王喆,武成崗,賴遠明,康妍:一種面向應用程序的特權(quán)硬件定制化平臺的技術(shù) CN201910462140.3已受理?
[4]王喆,武成崗,賴遠明,康妍:一種應用的保護方法及系統(tǒng) CN 201810164759.1已受理?
[5]武成崗,王喆,唐博文,賈力陳,謝夢瑤:一種微架構(gòu) CN202010054119.2已受理?
[6]武成崗,王喆,唐博文,賈力陳,謝夢瑤:一種基于緩存劃分及回滾的處理器瞬態(tài)攻擊防御方法 CN202010053240.3已受理?
[7]武成崗,王喆,唐博文,賈力陳,謝夢瑤:一種基于緩存回滾以防御處理器瞬態(tài)攻擊的裝置 CN202010053237.1已受理?
[8]武成崗,王喆,唐博文,賈力陳,謝夢瑤:一種基于緩存隨機無效的處理器瞬態(tài)攻擊防御方法 CN202010053213.6已受理?
科研項目:
[1]NSFC青年基金項目:《面向應用安全的特權(quán)級硬件挖掘研究》,項目負責人
[2]NSFC基金重點項目:《多層次軟件架構(gòu)的漏洞感知及防利用技術(shù)研究》,主要參與人
[3]北京市科委項目:《代碼布局持續(xù)隨機化關(guān)鍵技術(shù)研究》,主要參與人
獲獎及榮譽:
[1]2021年中國科學院大學領雁金獎/銀獎???????????????????????????? ?
[2]2020年中科院計算所“卓越之星”稱號????????????????????????? ?
[3]2020、2019年中科院計算所優(yōu)秀科研人員(兩次)? ?
[4]2018年中國科學院大學院長優(yōu)秀獎 ?
[5]2017年所長特別獎(夏培肅獎)????????????????????????????????????? ?
[6]2017、2015年博士研究生國家獎學金 ?
[7]2014年曙光博士生獎 ?
[8]2014年中國科學院大學“三好學生標兵”稱號?????????????????????????????????? ?
[9]2013年中國科學院大學“三好學生”稱號?
王喆 副研究員
研究方向:
所屬部門:處理器芯片重點實驗室
導師類別:碩導
聯(lián)系方式:wangzhe12@ict.ac.cn
個人網(wǎng)頁:https://zhexwang.github.io/